中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/89713
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 78852/78852 (100%)
Visitors : 35338672      Online Users : 415
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/89713


    Title: 無線感測網路環境下基於可靠信任模型的安全性拓樸控制之設計;Reliable Trust-Based Topology Control against Internal Attacks in Wireless Sensor Networks
    Authors: 王薏婷;Wang, Yi-Ting
    Contributors: 通訊工程學系
    Keywords: 信任模型;信任評估;安全性;無線感測網路;網路拓樸;Trust model;trust evaluation;security;wireless sensor networks;network topology
    Date: 2022-09-20
    Issue Date: 2022-10-04 11:53:56 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 由於無線感測網路(WSNs)環境的開放性,造成容易受到惡意節點的內部攻擊,現有的大多數研究都計算感測器之間的成功率來代表節點的直接信任,使用信任評估模型是檢測未知節點和保證無線感測網路安全的有效方法。然而,如同開關攻擊這種內部惡意行為,在只計算兩個節點間的直接信任模型下,是不足以確保彼此節點是可信的。因此本文提出了一種新穎的信任模型,該模型考慮節點通訊和剩餘電量來計算感測器節點之間的直接信任,並收集鄰居節點的意見來計算間接信任。此外,我們也解釋了直接信任和間接信任之間的權重來做信任值的整合,最後,此模型包含一個基於滑動窗口方法的加權平均來定期更新最終信任值。另外,我們開發了一種基於可靠信任的拓樸控制演算法 (RTTC),以利用我們的信任模型並創建基於安全性的網路拓樸設計。基於模擬結果,我們提出的模型可以準確評估感測器節點的可信度,有效防止安全漏洞。;Wireless sensor networks (WSNs) are vulnerable to internal attacks because of the openness of network environments. Using a trust evaluation model is a helpful approach for detecting unidentified sensor nodes and ensuring security protection in WSNs. However, most existing studies consider the communications between nodes to calculate the direct trust, which may not be enough to compute the trust value due to various internal attacks like on-off attacks and malicious behavior. This thesis proposes a novel trust model that considers communication and residual energy to calculate direct trust between sensor nodes and uses neighbors′ direct trusts to evaluate indirect trusts. Then, the weight between direct and recommendation trusts is explained. Finally, the integrated trust′s value is updated periodically so that this model includes a weighted average operator based on the sliding window method. Furthermore, we developed a reliable trust-based topology control algorithm (RTTC) to utilize our trust model and create a security-based network topology. Based on simulation results, our proposed model can accurately assess sensor nodes′ trustworthiness and effectively prevent security breaches.
    Appears in Collections:[Graduate Institute of Communication Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML129View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明